Cyberwarfare, a term that encompasses a wide range of computer-based attacks on targeted enemy states, has emerged as one of the most pressing national security concerns of the 21st century. All around the world, the scramble to shield thoroughly computerized military and infrastructure resources from cyber attacks is intensifying. Military experts, for example, believe that Ukraine's ability to defend its cyberspace from Russian cyber attacks was one of the key reasons Russia's dramatic 2022 invasion of neighboring Ukraine failed to topple the Ukrainian government in Kiev. This all-in-one…mehr
Cyberwarfare, a term that encompasses a wide range of computer-based attacks on targeted enemy states, has emerged as one of the most pressing national security concerns of the 21st century. All around the world, the scramble to shield thoroughly computerized military and infrastructure resources from cyber attacks is intensifying. Military experts, for example, believe that Ukraine's ability to defend its cyberspace from Russian cyber attacks was one of the key reasons Russia's dramatic 2022 invasion of neighboring Ukraine failed to topple the Ukrainian government in Kiev. This all-in-one resource explains the world of cyber warfare in authoritative but lay friendly terms. First, it details the historical evolution of cyber warfare and the different forms it can take, from crippling attacks on power grids and communications networks to secret intelligence gathering. From there it moves into a wide-ranging exploration of the main controversies and issues surrounding cyber security and cyber warfare, as well as coverage of major cyber warfare attacks, the organizations responsible, and the steps that the United States and other countries are taking to protect themselves from this constantly evolving threat. Like all books in the Contemporary World Issues series, this volume features a suite of "Perspectives" in which cyber warfare experts provide insights on various elements of cyber warfare. Other features include informative primary documents, data tables, chronology, and a glossary of terms.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Paul J. Springer is a professor of comparative military studies and chair of the department of research at Air Command and Staff College, USA and a senior fellow of the Foreign Policy Research Institute.
Inhaltsangabe
Preface 1. Background and History Information as a Tool of War The Role of Communications in Modern Warfare Early Attempts at Encryption Direct Observation Techniques The Creation of Cyberspace The Cyber Attacks Begin Cyber Enabling in the Nuclear Middle East Preparation for Infrastructure Cyber Attacks Russian Hacktivists and National Pride The Chinese Approach to Irregular Warfare Non-State Actors and Cyber War Ukraine and the Digital Conflict The Current State of Cyber War References 2. Problems, Controversies, and Solutions Is a Cyber War Possible? Cyber as a Military Domain Cyber Strategy Instruments of National Power Cyber Crime, Cyber Espionage, and Cyberterrorism The Problem of Attribution The Dangers of Escalation People and Paranoia Cyber Ethics Funding Conflict Through the Cyber Domain References 3. Perspectives The DoD Information System Network as a Weapon System Mary E. Braun The Challenges of Protecting Academia Kurt Peifer Ransomware and the Private Sector Christopher R. Boom Waging e-Jihad Heidi Dexter Cyber Warfare in the Professional Military Education System S. Michael Pavelec 4. Profiles Alexander, Keith B. Anonymous CrowdStrike Defense Advanced Research Projects Agency Defense Information Systems Agency (U.S.) Equation Group Fancy Bear (Russian Hacking Group) FireEye, Inc. Google, Inc. Government Communications Headquarters (GCHQ, United Kingdom) Hayden, Michael Kaspersky, Yevgeniy "Eugene" Valentinovich Lazarus Group (DPRK Hacking Group)Lehel, Marcel Lazar ("Guccifer") Libicki, Martin Mandiant McAfee, Inc. Microsoft Corporation Mitnick, Kevin Nakasone, Paul M. National Security Agency (U.S.) NATO Cooperative Cyber Defence Centre of Excellence People's Liberation Army Unit 61398 (PRC) Qiao Liang and Wang Xiangsui RAND Corporation Rogers, Michael S. Russian Business Network Shadow Brokers, The (Hacking Group) Snowden, Edward Stuxnet Symantec Corporation Syrian Electronic Army Turing, Alan U.S. Cyber Command WikiLeaks References 5. Documents Tallinn Manual on the International Law Applicable to Cyber Warfare (2010) Michael Rogers, "Testimony before the U.S. House Intelligence Committee" (2014) People's Republic of China National Cyberspace Security Strategy (2016) Assessing Russian Activities and Intentions in Recent U.S. Elections (2017) Military and Security Developments Involving the Democratic People's Republic of Korea (2017) Glenn S. Gerstell, "How We Need to Prepare for a Global Cyber Pandemic" (2018) National Cyber Strategy of the United States (2018) Executive Order 13800-Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2018) Department of Homeland Security Cybersecurity Strategy (2021) Cybersecurity & Infrastructure Security Agency, "Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure" (2022) 6. Resources Print Resources Nonprint Resources 7. Chronology Glossary Index About the Author
Preface 1. Background and History Information as a Tool of War The Role of Communications in Modern Warfare Early Attempts at Encryption Direct Observation Techniques The Creation of Cyberspace The Cyber Attacks Begin Cyber Enabling in the Nuclear Middle East Preparation for Infrastructure Cyber Attacks Russian Hacktivists and National Pride The Chinese Approach to Irregular Warfare Non-State Actors and Cyber War Ukraine and the Digital Conflict The Current State of Cyber War References 2. Problems, Controversies, and Solutions Is a Cyber War Possible? Cyber as a Military Domain Cyber Strategy Instruments of National Power Cyber Crime, Cyber Espionage, and Cyberterrorism The Problem of Attribution The Dangers of Escalation People and Paranoia Cyber Ethics Funding Conflict Through the Cyber Domain References 3. Perspectives The DoD Information System Network as a Weapon System Mary E. Braun The Challenges of Protecting Academia Kurt Peifer Ransomware and the Private Sector Christopher R. Boom Waging e-Jihad Heidi Dexter Cyber Warfare in the Professional Military Education System S. Michael Pavelec 4. Profiles Alexander, Keith B. Anonymous CrowdStrike Defense Advanced Research Projects Agency Defense Information Systems Agency (U.S.) Equation Group Fancy Bear (Russian Hacking Group) FireEye, Inc. Google, Inc. Government Communications Headquarters (GCHQ, United Kingdom) Hayden, Michael Kaspersky, Yevgeniy "Eugene" Valentinovich Lazarus Group (DPRK Hacking Group)Lehel, Marcel Lazar ("Guccifer") Libicki, Martin Mandiant McAfee, Inc. Microsoft Corporation Mitnick, Kevin Nakasone, Paul M. National Security Agency (U.S.) NATO Cooperative Cyber Defence Centre of Excellence People's Liberation Army Unit 61398 (PRC) Qiao Liang and Wang Xiangsui RAND Corporation Rogers, Michael S. Russian Business Network Shadow Brokers, The (Hacking Group) Snowden, Edward Stuxnet Symantec Corporation Syrian Electronic Army Turing, Alan U.S. Cyber Command WikiLeaks References 5. Documents Tallinn Manual on the International Law Applicable to Cyber Warfare (2010) Michael Rogers, "Testimony before the U.S. House Intelligence Committee" (2014) People's Republic of China National Cyberspace Security Strategy (2016) Assessing Russian Activities and Intentions in Recent U.S. Elections (2017) Military and Security Developments Involving the Democratic People's Republic of Korea (2017) Glenn S. Gerstell, "How We Need to Prepare for a Global Cyber Pandemic" (2018) National Cyber Strategy of the United States (2018) Executive Order 13800-Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2018) Department of Homeland Security Cybersecurity Strategy (2021) Cybersecurity & Infrastructure Security Agency, "Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure" (2022) 6. Resources Print Resources Nonprint Resources 7. Chronology Glossary Index About the Author
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497